Enhancing security on IPv6 neighbor discovery using trust-ND.
Neighbor discovery protocol (NDP) is a core IPv6 protocol for local network operations. Unfortunately, NDP was designed without proper security mechanism which leave IPv6 nodes vulnerable to attacks. The rising trend of insider attacks increases the severity of the risk. To address this issue, IETF...
| Main Author: | Chong , Yung Wey |
|---|---|
| Format: | Monograph |
| Published: |
Universiti Sains Malaysia
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/36733/ |
Similar Items
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
IPv6 performance analysis on FreeBSD workstation using simple applications
by: Ettikan, K., et al.
Published: (2000)
by: Ettikan, K., et al.
Published: (2000)
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009)
by: Tat, Chee Wan, et al.
Published: (2009)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Impact of Redhat IPv6 router on heterogeneous host connections
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Improving IPv6 Packets Transmission Over High Speed Networks By Introducing CRC Extension Header
by: Supriyanto, .
Published: (2010)
by: Supriyanto, .
Published: (2010)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
by: Kadhim, Ammar Ismael
Published: (2016)
by: Kadhim, Ammar Ismael
Published: (2016)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Landmark Image Discovery Using Network Clustering"
by: Mohammed Al-Zou’Bi, Ala’A Ahmed
Published: (2022)
by: Mohammed Al-Zou’Bi, Ala’A Ahmed
Published: (2022)
Knowledge discovery through composited visualization, navigation and retrieval
by: Lim, Wei-Ching, et al.
Published: (2005)
by: Lim, Wei-Ching, et al.
Published: (2005)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Using ensemble and learning techniques towards extending the knowledge Discovery Pipeline.
by: Yu, N Cheah, et al.
Published: (2002)
by: Yu, N Cheah, et al.
Published: (2002)
Survey And New Approach In Service Discovery And Advertisement For Mobile Ad Hoc Networks.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
The Acceptance Of Breast Self-Examination (BSE) Teleconsultation Using TAM-IDT-TRUST Model
by: Talib, Norayu Abdul
Published: (2012)
by: Talib, Norayu Abdul
Published: (2012)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
Initial Trust Antecedents Leading To
Purchasing Intention In B2c
E-Commerce Websites
by: Aris, Aszifa
Published: (2016)
by: Aris, Aszifa
Published: (2016)
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CST334 – Network Monitoring & Security
(Pengawasan & Keselamatan Rangkaian)
CST338 – Network And Communication Security
(Keselamatan Rangkaian Dan Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CST314 - NETWORK AND SECURITY MANAGEMENT MARCH 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
CST314 - NETWORK MANAGEMENT AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016) -
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017) -
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009) -
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)